Please turn on your JavaScript for this page to function normally.
Mobile banking trends and hidden risks

While mobile banking apps are growing quickly in popularity, 68 percent of smartphone owners who have not yet adopted these apps are holding back due to security fears, while …

Backdoor Trojan masquerading as KLM e-ticket

As many flyers tend to book their tickets online and receive them in electronic form, it’s no wonder that malware peddlers often choose to deliver their malicious wares …

Fake debt payment notices deliver malware

Emails purportedly coming from PayPal’s Bill Me Later service have been hitting inboxes around the world, threatening to file charges against the users if they do not …

Twitter messages lead to phishing AND malware

If you have received a private message from another Twitter telling you “lol ur famous now”, have followed it to a fake Facebook page requiring you to log into …

Pinterest users targeted with fake ad-pushing app

Pinterest, the extremely popular pinboard-style social photo sharing website, has launched official apps for Android, iPad and iPhone back in April, but that hasn’t …

Darwin’s theory applies to malware

G Data’s new malware report shows a new and unexpected development in malware: the extreme growth of new malicious programs seems to be slowing down. Granted, the …

Google Go programming language used for creating destructive Trojan

When Google introduced its Go programming language in 2009, they surely didn’t hope for it to be used for writing malware but, as these things go, it was a only a matter …

Analysis of Flame C&C servers reveals more unknown malware

Since its discovery by Kaspersky Lab and CrySyS researchers back in May, the Flame malware and its C&C infrastructure are being analyzed for additional clues on who might …

Foreign journalists in China targeted with malware-laden emails

Foreign news correspondents stationed in China have recently become targets of two separate but similar malware attacks aimed at stealing information from their computers, …

The various spam campaigns leading to Blackhole

At any given time, there is a considerable number of email spam campaigns that ultimately lead users to pages hosting exploit kits – more often then not the extremely …

Android malware threats analysis

Bitdefender released its August 2012 Android malware threats report. While in August the percentage of adware-bundled apps dropped to 55.15 per cent, from July’s 77.34 …

Microsoft’s study into unsecure supply chains leads to botnet disruption

Microsoft’s Digital Crimes Unit has disrupted the functioning of yet another botnet by effecting a takedown of a domain which was also hosting over 500 different strains …

Don't miss

Cybersecurity news